首页 > 最新文献

Annals of Telecommunications最新文献

英文 中文
A deeper look at Ariadne: a privacy-preserving network layer protocol 深入了解阿里阿德涅:保护隐私的网络层协议
IF 1.9 4区 计算机科学 Q2 Engineering Pub Date : 2024-03-13 DOI: 10.1007/s12243-024-01017-5
Antoine Fressancourt, Luigi Iannone, Mael Kerichard

We present a deeper analysis of Ariadne, a privacy-preserving network layer communication protocol that we introduced in Fressancourt and Iannone (2023). Ariadne uses a source routing approach to avoid relying on trusted third parties. In Ariadne, a source node willing to send anonymized network traffic to a destination uses a path consisting in nodes with which it has pre-shared symmetric keys. Temporary keys derived from those pre-shared keys are used to protect the communication’s privacy using onion routing techniques, ensuring session unlinkability for packets following the same path. Ariadne enhances previous approaches to preserve communication privacy by introducing two novelties. First, the source route is encoded in a fixed size, sequentially encrypted vector of routing information elements, in which the elements’ positions in the vector are pseudo-randomly permuted. Second, the temporary keys used to process the packets on the path are referenced using mutually known encrypted patterns. This avoids the use of an explicit key reference that could be used to de-anonymize the communications. This article enriches our previous presentation of Ariadne Fressancourt and Iannone (2023) with a set of formal proofs of its security properties. Besides, a performance evaluation of Ariadne’s Rust implementation is presented to assess the ability of our protocol to protect privacy at the network layer in real-world use cases.

我们在 Fressancourt 和 Iannone(2023 年)中介绍了一种保护隐私的网络层通信协议 Ariadne,并对其进行了深入分析。阿里阿德涅使用源路由方法来避免依赖可信第三方。在阿里阿德涅中,愿意向目的地发送匿名网络流量的源节点会使用一条由节点组成的路径,而这些节点之间有预先共享的对称密钥。利用洋葱路由技术,从这些预共享密钥衍生出的临时密钥可用于保护通信隐私,确保沿相同路径发送的数据包具有会话不可链接性。阿里阿德涅通过引入两个新功能,增强了以往保护通信隐私的方法。首先,源路由被编码为一个固定大小、按顺序加密的路由信息元素向量,其中元素在向量中的位置是伪随机排列的。其次,用于处理路径上数据包的临时密钥使用相互已知的加密模式进行引用。这就避免了使用明确的密钥参考,因为这种参考可能会被用来对通信进行去匿名化处理。这篇文章丰富了我们之前对阿里阿德涅的介绍,对其安全特性进行了一系列形式化证明。此外,本文还对阿里阿德涅的 Rust 实现进行了性能评估,以评估我们的协议在实际应用案例中保护网络层隐私的能力。
{"title":"A deeper look at Ariadne: a privacy-preserving network layer protocol","authors":"Antoine Fressancourt, Luigi Iannone, Mael Kerichard","doi":"10.1007/s12243-024-01017-5","DOIUrl":"https://doi.org/10.1007/s12243-024-01017-5","url":null,"abstract":"<p>We present a deeper analysis of Ariadne, a privacy-preserving network layer communication protocol that we introduced in Fressancourt and Iannone (2023). Ariadne uses a source routing approach to avoid relying on trusted third parties. In Ariadne, a source node willing to send anonymized network traffic to a destination uses a path consisting in nodes with which it has pre-shared symmetric keys. Temporary keys derived from those pre-shared keys are used to protect the communication’s privacy using onion routing techniques, ensuring <i>session unlinkability</i> for packets following the same path. Ariadne enhances previous approaches to preserve communication privacy by introducing two novelties. First, the source route is encoded in a fixed size, sequentially encrypted vector of routing information elements, in which the elements’ positions in the vector are pseudo-randomly permuted. Second, the temporary keys used to process the packets on the path are referenced using mutually known encrypted patterns. This avoids the use of an explicit key reference that could be used to de-anonymize the communications. This article enriches our previous presentation of Ariadne Fressancourt and Iannone (2023) with a set of formal proofs of its security properties. Besides, a performance evaluation of Ariadne’s Rust implementation is presented to assess the ability of our protocol to protect privacy at the network layer in real-world use cases.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140116886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mirage: cyber deception against autonomous cyber attacks in emulation and simulation 幻影:在仿真和模拟中对抗自主网络攻击的网络欺骗行为
IF 1.9 4区 计算机科学 Q2 Engineering Pub Date : 2024-03-13 DOI: 10.1007/s12243-024-01018-4
Michael Kouremetis, Dean Lawrence, Ron Alford, Zoe Cheuvront, David Davila, Benjamin Geyer, Trevor Haigh, Ethan Michalak, Rachel Murphy, Gianpaolo Russo

As the capabilities of cyber adversaries continue to evolve, now in parallel to the explosion of maturing and publicly-available artificial intelligence (AI) technologies, cyber defenders may reasonably wonder when cyber adversaries will begin to also field these AI technologies. In this regard, some promising (read: scary) areas of AI for cyber attack capabilities are search, automated planning, and reinforcement learning. As such, one possible defensive mechanism against future AI-enabled adversaries is that of cyber deception. To that end, in this work, we present and evaluate Mirage, an experimentation system demonstrated in both emulation and simulation forms that allows for the implementation and testing of novel cyber deceptions designed to counter cyber adversaries that use AI search and planning capabilities.

随着网络对手能力的不断发展,以及人工智能(AI)技术的不断成熟和公开,网络防御者有理由怀疑网络对手何时也会开始使用这些人工智能技术。在这方面,人工智能在网络攻击能力方面的一些有前途(读作:可怕)的领域是搜索、自动规划和强化学习。因此,针对未来人工智能对手的一种可能防御机制就是网络欺骗。为此,在这项工作中,我们介绍并评估了 Mirage,这是一个以仿真和模拟形式展示的实验系统,允许实施和测试新型网络欺骗,旨在对抗使用人工智能搜索和规划能力的网络对手。
{"title":"Mirage: cyber deception against autonomous cyber attacks in emulation and simulation","authors":"Michael Kouremetis, Dean Lawrence, Ron Alford, Zoe Cheuvront, David Davila, Benjamin Geyer, Trevor Haigh, Ethan Michalak, Rachel Murphy, Gianpaolo Russo","doi":"10.1007/s12243-024-01018-4","DOIUrl":"https://doi.org/10.1007/s12243-024-01018-4","url":null,"abstract":"<p>As the capabilities of cyber adversaries continue to evolve, now in parallel to the explosion of maturing and publicly-available artificial intelligence (AI) technologies, cyber defenders may reasonably wonder when cyber adversaries will begin to also field these AI technologies. In this regard, some promising (read: scary) areas of AI for cyber attack capabilities are search, automated planning, and reinforcement learning. As such, one possible defensive mechanism against future AI-enabled adversaries is that of cyber deception. To that end, in this work, we present and evaluate Mirage, an experimentation system demonstrated in both emulation and simulation forms that allows for the implementation and testing of novel cyber deceptions designed to counter cyber adversaries that use AI search and planning capabilities.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140116917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient representation of disoccluded regions in 3D video coding 在 3D 视频编码中高效表示不包括的区域
IF 1.9 4区 计算机科学 Q2 Engineering Pub Date : 2024-03-12 DOI: 10.1007/s12243-024-01019-3
Muhammad Shahid Farid, Badi uz Zaman Babar, Muhammad Hassan Khan

Three-dimensional (3D) video technology has gained immense admiration in recent times due to its numerous applications, particularly in the television and cinema industry. Three-dimensional television (3DTV) and free-viewpoint television (FTV) are two well-known applications that provide the end-user with a real-world and high-quality 3D display. In both applications, multiple views captured from different viewpoints are rendered simultaneously to offer depth sensation to the viewer. A large number of views are needed to enable FTV. However, transmitting this massive amount of data is challenging due to bandwidth limitations. Multiview video-plus-depth (MVD) is the most popular format where in addition to color images, corresponding depth information is also available which represents the scene geometry. The MVD format with the help of depth image-based rendering (DIBR) enables the generation of views at novel viewpoints. In this paper, we introduce a panorama-based representation of MVD data with an efficient keyframe-based disocclusions handling technique. The panorama view for a stereo pair with depth is constructed from the left view and the novel appearing region of the right view which is not visible from the left viewpoint. The disocclusions that appear in the right view when obtained from the DIBR of the left view are collected in a special frame named as keyframe. On the decoder side, the left view is available with a simple crop of panorama view. The right view is obtained through DIBR of the left view combined with the appearing region from the panorama view. The disocclusions in this warped view are filled from the keyframe. The panorama view with additional keyframes and the corresponding depth map are compressed using the standard HEVC codec. The experimental evaluations performed on standard MVD sequences showed that the proposed scheme achieves excellent video quality while saving considerable bit rate compared to HEVC simulcast.

近年来,三维(3D)视频技术因其众多的应用而备受推崇,尤其是在电视和电影行业。三维电视(3DTV)和自由视点电视(FTV)是两种著名的应用,可为终端用户提供真实世界的高质量三维显示。在这两种应用中,从不同视点捕捉的多个视图会同时渲染,为观众提供深度感。FTV 需要大量的视图。然而,由于带宽限制,传输这种海量数据具有挑战性。多视角视频加深度(MVD)是最流行的格式,除了彩色图像外,还提供相应的深度信息,以表示场景的几何形状。MVD 格式在基于深度图像的渲染(DIBR)的帮助下,可以生成新视角的视图。在本文中,我们介绍了一种基于全景的 MVD 数据表示方法,以及一种高效的基于关键帧的不连贯处理技术。有深度的立体对的全景视图是由左视图和右视图中从左视角看不到的新出现区域构建的。从左视图的 DIBR 中获得的右视图中出现的不包含物被收集到一个特殊的帧中,该帧被命名为关键帧。在解码器方面,左视图可通过简单的全景裁剪获得。右视图是通过左视图的 DIBR 和全景图中出现的区域结合获得的。该扭曲视图中的不连贯区域由关键帧填充。带有附加关键帧的全景图和相应的深度图使用标准的 HEVC 编解码器进行压缩。在标准 MVD 序列上进行的实验评估表明,与 HEVC 同步广播相比,所提出的方案在节省大量比特率的同时,还实现了出色的视频质量。
{"title":"Efficient representation of disoccluded regions in 3D video coding","authors":"Muhammad Shahid Farid, Badi uz Zaman Babar, Muhammad Hassan Khan","doi":"10.1007/s12243-024-01019-3","DOIUrl":"https://doi.org/10.1007/s12243-024-01019-3","url":null,"abstract":"<p>Three-dimensional (3D) video technology has gained immense admiration in recent times due to its numerous applications, particularly in the television and cinema industry. Three-dimensional television (3DTV) and free-viewpoint television (FTV) are two well-known applications that provide the end-user with a real-world and high-quality 3D display. In both applications, multiple views captured from different viewpoints are rendered simultaneously to offer depth sensation to the viewer. A large number of views are needed to enable FTV. However, transmitting this massive amount of data is challenging due to bandwidth limitations. Multiview video-plus-depth (MVD) is the most popular format where in addition to color images, corresponding depth information is also available which represents the scene geometry. The MVD format with the help of depth image-based rendering (DIBR) enables the generation of views at novel viewpoints. In this paper, we introduce a panorama-based representation of MVD data with an efficient keyframe-based disocclusions handling technique. The panorama view for a stereo pair with depth is constructed from the left view and the novel appearing region of the right view which is not visible from the left viewpoint. The disocclusions that appear in the right view when obtained from the DIBR of the left view are collected in a special frame named as keyframe. On the decoder side, the left view is available with a simple crop of panorama view. The right view is obtained through DIBR of the left view combined with the appearing region from the panorama view. The disocclusions in this warped view are filled from the keyframe. The panorama view with additional keyframes and the corresponding depth map are compressed using the standard HEVC codec. The experimental evaluations performed on standard MVD sequences showed that the proposed scheme achieves excellent video quality while saving considerable bit rate compared to HEVC simulcast.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-03-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140116948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating pending interest table performance under the collusive interest flooding attack in named data networks 评估命名数据网络中串通兴趣泛滥攻击下的待定兴趣表性能
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-29 DOI: 10.1007/s12243-024-01016-6
Diego Canizio Lopes, André Nasserala, Ian Vilar Bastos, Igor Monteiro Moraes

In this article, we investigate the performance of the Pending Interest Table (PIT) of named data networking (NDN) routers in the presence of a collusive interest flooding attack (CIFA), which can overwhelm the PIT and cause delays in content retrieval. We simulate and evaluate the attack’s impact on the PIT occupancy rate and content retrieval delay. The results reveal that the CIFA is highly effective in compromising the performance of NDN routers, leading to high PIT occupancy rates, long content retrieval delays, and degraded overall network performance. The PIT occupancy rate can reach 95.83% during the attack, while the interest retrieval rate is less than 30%. The study highlights the need for effective countermeasures to mitigate the impact of such attacks.

在本文中,我们研究了命名数据网络(NDN)路由器的待定兴趣表(PIT)在串通兴趣泛洪攻击(CIFA)情况下的性能,串通兴趣泛洪攻击可能会淹没 PIT 并导致内容检索延迟。我们模拟并评估了攻击对 PIT 占用率和内容检索延迟的影响。结果表明,CIFA 能非常有效地损害 NDN 路由器的性能,导致 PIT 占用率高、内容检索延迟长以及整体网络性能下降。在攻击期间,PIT 占用率可达 95.83%,而兴趣检索率不到 30%。这项研究强调了采取有效对策以减轻此类攻击影响的必要性。
{"title":"Evaluating pending interest table performance under the collusive interest flooding attack in named data networks","authors":"Diego Canizio Lopes,&nbsp;André Nasserala,&nbsp;Ian Vilar Bastos,&nbsp;Igor Monteiro Moraes","doi":"10.1007/s12243-024-01016-6","DOIUrl":"10.1007/s12243-024-01016-6","url":null,"abstract":"<div><p>In this article, we investigate the performance of the Pending Interest Table (PIT) of named data networking (NDN) routers in the presence of a collusive interest flooding attack (CIFA), which can overwhelm the PIT and cause delays in content retrieval. We simulate and evaluate the attack’s impact on the PIT occupancy rate and content retrieval delay. The results reveal that the CIFA is highly effective in compromising the performance of NDN routers, leading to high PIT occupancy rates, long content retrieval delays, and degraded overall network performance. The PIT occupancy rate can reach 95.83% during the attack, while the interest retrieval rate is less than 30%. The study highlights the need for effective countermeasures to mitigate the impact of such attacks.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140007618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Orthogonal beamforming technique for massive MIMO systems 大规模多输入多输出系统的正交波束成形技术
IF 1.9 4区 计算机科学 Q2 Engineering Pub Date : 2024-02-21 DOI: 10.1007/s12243-024-01013-9
Marwa Abdelfatah, Abdelhalim Zekry, Shaimaa ElSayed

Beamforming represents a pivotal technology in massive multiple-input multiple-output (MIMO) systems, as it facilitates the regulation of transmission and reception operations. Beamforming techniques’ categorization is based either on their hardware architecture or implementation strategy. This paper proposes an orthogonal beamforming technology founded on a specific implementation method that utilizes predetermined orthogonal beams to serve users. The suggested approach incorporates numerous orthogonal beams relying on a substantial number of antennas at the base station. The primary objective of this approach is to enhance the performance of massive MIMO systems by augmenting spectral efficiency and accommodating more users. The proposed beamforming approach is well suited for millimeter frequency bands. The purpose of this paper is to explore the suggested orthogonal beamforming technology. The concept of this approach is described at first and then followed by an evaluation of its efficacy for a single user through the allocation of orthogonal beams. The suggested approach is also examined in the context of multiuser systems, and the results are compared with the adaptive ZF beamforming technique. Furthermore, the paper presents solutions to the issues that may arise in multiuser systems, for example, ensuring that each orthogonal beam is assigned to only one user. The simulations conducted in this study demonstrate that the suggested approach outperforms the ZF technique in terms of both the spectral efficiency and the number of serviced users. Specifically, the suggested approach can enhance SE by approximately 40.6% over the ZF technique, and it can support up to double the number of users when compared to the ZF approach.

波束成形是大规模多输入多输出(MIMO)系统中的一项关键技术,因为它有助于调节传输和接收操作。波束成形技术的分类基于其硬件架构或实施策略。本文提出了一种正交波束成形技术,它基于一种特定的实施方法,利用预定的正交波束为用户提供服务。建议的方法依靠基站的大量天线整合了许多正交波束。这种方法的主要目的是通过提高频谱效率和容纳更多用户来增强大规模多输入多输出系统的性能。所提出的波束成形方法非常适合毫米频段。本文旨在探讨所建议的正交波束成形技术。首先介绍了这种方法的概念,然后评估了它通过分配正交波束对单个用户的功效。本文还结合多用户系统对建议的方法进行了研究,并将研究结果与自适应 ZF 波束成形技术进行了比较。此外,论文还针对多用户系统中可能出现的问题提出了解决方案,例如确保每个正交波束只分配给一个用户。本研究进行的仿真表明,建议的方法在频谱效率和服务用户数量方面都优于 ZF 技术。具体来说,与 ZF 技术相比,建议的方法可将 SE 提高约 40.6%,与 ZF 方法相比,它可支持多达两倍的用户数量。
{"title":"Orthogonal beamforming technique for massive MIMO systems","authors":"Marwa Abdelfatah, Abdelhalim Zekry, Shaimaa ElSayed","doi":"10.1007/s12243-024-01013-9","DOIUrl":"https://doi.org/10.1007/s12243-024-01013-9","url":null,"abstract":"<p>Beamforming represents a pivotal technology in massive multiple-input multiple-output (MIMO) systems, as it facilitates the regulation of transmission and reception operations. Beamforming techniques’ categorization is based either on their hardware architecture or implementation strategy. This paper proposes an orthogonal beamforming technology founded on a specific implementation method that utilizes predetermined orthogonal beams to serve users. The suggested approach incorporates numerous orthogonal beams relying on a substantial number of antennas at the base station. The primary objective of this approach is to enhance the performance of massive MIMO systems by augmenting spectral efficiency and accommodating more users. The proposed beamforming approach is well suited for millimeter frequency bands. The purpose of this paper is to explore the suggested orthogonal beamforming technology. The concept of this approach is described at first and then followed by an evaluation of its efficacy for a single user through the allocation of orthogonal beams. The suggested approach is also examined in the context of multiuser systems, and the results are compared with the adaptive ZF beamforming technique. Furthermore, the paper presents solutions to the issues that may arise in multiuser systems, for example, ensuring that each orthogonal beam is assigned to only one user. The simulations conducted in this study demonstrate that the suggested approach outperforms the ZF technique in terms of both the spectral efficiency and the number of serviced users. Specifically, the suggested approach can enhance SE by approximately 40.6% over the ZF technique, and it can support up to double the number of users when compared to the ZF approach.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139920383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game theoretical analysis of green technology innovation partnerships: equipment manufacturers and network operators 绿色技术创新伙伴关系的博弈论分析:设备制造商和网络运营商
IF 1.9 4区 计算机科学 Q2 Engineering Pub Date : 2024-02-21 DOI: 10.1007/s12243-024-01012-w
Luona Song, Yinglei Teng, Yeyuan Feng, Merveille Nicolas, Jian Zhang

While an increasing number of telecommunications firms are adopting green innovation (GI), research on the conditions under which innovation and collaboration decisions are made is still lacking. This paper proposes a mathematical model integrating innovation level, trust, and knowledge investment dimensions. Innovation and collaboration behaviors are discussed under various scenarios. A simulation is conducted with an evolutionary game theory approach to observe the effect of different parameters on innovation formation. The simulation analysis presents the optimal strategies for each scenario. Research on the green innovation behaviors of telecom operators and the impact of innovation strategies on operations and revenue have reference significance for telecom operators when it comes to selecting favorable innovation strategies, finding suitable partners and forming a relatively stable cooperative relationship in the industrial ecosystem.

尽管越来越多的电信公司开始采用绿色创新(GI),但对创新与合作决策的条件仍缺乏研究。本文提出了一个整合创新水平、信任和知识投资维度的数学模型。本文讨论了各种情景下的创新与合作行为。本文采用进化博弈论方法进行了模拟,以观察不同参数对创新形成的影响。模拟分析提出了每种情景下的最优策略。研究电信运营商的绿色创新行为以及创新策略对运营和收入的影响,对于电信运营商在产业生态系统中选择有利的创新策略、寻找合适的合作伙伴并形成相对稳定的合作关系具有借鉴意义。
{"title":"Game theoretical analysis of green technology innovation partnerships: equipment manufacturers and network operators","authors":"Luona Song, Yinglei Teng, Yeyuan Feng, Merveille Nicolas, Jian Zhang","doi":"10.1007/s12243-024-01012-w","DOIUrl":"https://doi.org/10.1007/s12243-024-01012-w","url":null,"abstract":"<p>While an increasing number of telecommunications firms are adopting green innovation (GI), research on the conditions under which innovation and collaboration decisions are made is still lacking. This paper proposes a mathematical model integrating innovation level, trust, and knowledge investment dimensions. Innovation and collaboration behaviors are discussed under various scenarios. A simulation is conducted with an evolutionary game theory approach to observe the effect of different parameters on innovation formation. The simulation analysis presents the optimal strategies for each scenario. Research on the green innovation behaviors of telecom operators and the impact of innovation strategies on operations and revenue have reference significance for telecom operators when it comes to selecting favorable innovation strategies, finding suitable partners and forming a relatively stable cooperative relationship in the industrial ecosystem.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139920278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Troubleshooting distributed network emulation 分布式网络模拟故障排除
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-19 DOI: 10.1007/s12243-024-01010-y
Houssam ElBouanani, Chadi Barakat, Walid Dabbous, Thierry Turletti

Distributed network emulators allow users to perform network evaluation by running large-scale virtual networks over a cluster of fewer machines. While they offer accessible testing environments for researchers to evaluate their contributions and for the community to reproduce its results, their use of limited physical network and compute resources can silently and negatively impact the emulation results. In this paper, we present a methodology that uses linear optimization to extract information about the physical infrastructure from emulation-level packet delay measurements, in order to pinpoint the root causes of emulation inaccuracy with minimal hypotheses. We evaluate the precision of our methodology using numerical simulations and then show how its implementation performs in a real network scenario.

分布式网络仿真器允许用户通过在较少机器的集群上运行大规模虚拟网络来进行网络评估。虽然它们为研究人员评估其贡献和社区重现其结果提供了可访问的测试环境,但它们对有限的物理网络和计算资源的使用会无声无息地对仿真结果产生负面影响。在本文中,我们介绍了一种使用线性优化从仿真级数据包延迟测量中提取物理基础设施信息的方法,以便以最少的假设找出仿真不准确的根本原因。我们使用数值模拟评估了我们方法的精确性,然后展示了该方法在真实网络场景中的实施效果。
{"title":"Troubleshooting distributed network emulation","authors":"Houssam ElBouanani,&nbsp;Chadi Barakat,&nbsp;Walid Dabbous,&nbsp;Thierry Turletti","doi":"10.1007/s12243-024-01010-y","DOIUrl":"10.1007/s12243-024-01010-y","url":null,"abstract":"<div><p>Distributed network emulators allow users to perform network evaluation by running large-scale virtual networks over a cluster of fewer machines. While they offer accessible testing environments for researchers to evaluate their contributions and for the community to reproduce its results, their use of limited physical network and compute resources can silently and negatively impact the emulation results. In this paper, we present a methodology that uses linear optimization to extract information about the physical infrastructure from emulation-level packet delay measurements, in order to pinpoint the root causes of emulation inaccuracy with minimal hypotheses. We evaluate the precision of our methodology using numerical simulations and then show how its implementation performs in a real network scenario.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2024-02-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139911182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pilot power optimization in scalable user-centric HC-RANs for future IoT and IIoT applications 面向未来物联网和 IIoT 应用的可扩展、以用户为中心的 HC-RAN 中的试点功率优化
IF 1.9 4区 计算机科学 Q2 Engineering Pub Date : 2024-02-16 DOI: 10.1007/s12243-024-01014-8
Hareesh Ayanampudi, Ravindra Dhuli

In this paper, a scalable user-centric HC-RAN is taken into consideration, where each remote radio head (RRH) serves user equipments (UEs) over the same time/frequency resources by using time division duplex (TDD) mode. Network scalability results in the front-haul load and computational complexity at the baseband unit (BBU) pool remaining constant irrespective of the number of UEs in the network. During the channel estimation phase, each RRH will acquire the channel state information (CSI) based on the received pilot signals from the UEs. With the available CSI, each RRH will decode/precode the desired UE information in uplink and downlink, respectively. However, in ultra-dense networks, pilot contamination is a major limitation that hugely impacts the system’s performance. To address this, we proposed an uplink pilot power optimization algorithm by considering the inter-user interference due to pilot sharing and RRH selection. In this algorithm, the pilot power coefficients are designed in such a way as to decrease the mean square error (MSE) of the channel estimates. To achieve this, we used the successive convex approximation method. Moreover, we derived a closed-form expression for achievable spectral efficiency (SE) per UE, which will be valid for any pilot/data power optimization and RRH selection scheme. The results show that the proposed algorithm significantly improves the system performance in the channel estimation phase and will be more suitable for urban environments.

本文考虑了一种以用户为中心的可扩展 HC-RAN,其中每个远程无线电头(RRH)通过使用时分双工(TDD)模式在相同的时间/频率资源上为用户设备(UE)提供服务。无论网络中的 UE 数量多少,网络的可扩展性都会导致基带单元(BBU)池的前端负荷和计算复杂度保持不变。在信道估计阶段,每个 RRH 将根据从 UE 接收到的先导信号获取信道状态信息(CSI)。利用可用的 CSI,每个 RRH 将在上行和下行链路中分别对所需的 UE 信息进行解码/预编码。然而,在超密集网络中,先导污染是一个主要限制因素,会严重影响系统性能。针对这一问题,我们提出了一种上行链路先导功率优化算法,该算法考虑了由于先导共享和 RRH 选择造成的用户间干扰。在该算法中,先导功率系数的设计方式是降低信道估计的均方误差(MSE)。为此,我们采用了连续凸近似法。此外,我们还推导出了每个 UE 可实现频谱效率 (SE) 的闭式表达式,该表达式适用于任何先导/数据功率优化和 RRH 选择方案。结果表明,所提出的算法能显著提高信道估计阶段的系统性能,而且更适用于城市环境。
{"title":"Pilot power optimization in scalable user-centric HC-RANs for future IoT and IIoT applications","authors":"Hareesh Ayanampudi, Ravindra Dhuli","doi":"10.1007/s12243-024-01014-8","DOIUrl":"https://doi.org/10.1007/s12243-024-01014-8","url":null,"abstract":"<p>In this paper, a scalable user-centric HC-RAN is taken into consideration, where each remote radio head (RRH) serves user equipments (UEs) over the same time/frequency resources by using time division duplex (TDD) mode. Network scalability results in the front-haul load and computational complexity at the baseband unit (BBU) pool remaining constant irrespective of the number of UEs in the network. During the channel estimation phase, each RRH will acquire the channel state information (CSI) based on the received pilot signals from the UEs. With the available CSI, each RRH will decode/precode the desired UE information in uplink and downlink, respectively. However, in ultra-dense networks, pilot contamination is a major limitation that hugely impacts the system’s performance. To address this, we proposed an uplink pilot power optimization algorithm by considering the inter-user interference due to pilot sharing and RRH selection. In this algorithm, the pilot power coefficients are designed in such a way as to decrease the mean square error (MSE) of the channel estimates. To achieve this, we used the successive convex approximation method. Moreover, we derived a closed-form expression for achievable spectral efficiency (SE) per UE, which will be valid for any pilot/data power optimization and RRH selection scheme. The results show that the proposed algorithm significantly improves the system performance in the channel estimation phase and will be more suitable for urban environments.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139755092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-efficient cluster-based routing protocol for heterogeneous wireless sensor network 基于集群的异构无线传感器网络节能路由协议
IF 1.9 4区 计算机科学 Q2 Engineering Pub Date : 2024-02-13 DOI: 10.1007/s12243-024-01015-7
Piyush Rawat, Gopal Singh Rawat, Harish Rawat, Siddhartha Chauhan

The sensor nodes in a wireless sensor network are equipped with a limited amount of energy. It is therefore necessary to ensure that the network’s lifespan is extended through efficient use of energy. Using cluster-based routing in wireless sensor networks is one of the most effective ways to deal with energy issues and improve the lifetime of the network. In this paper, an energy-efficient cluster-based routing protocol named Cluster Routing Protocol for Heterogeneous Network (CPHN) is proposed. The proposed CPHN makes use of the initial and residual energy levels of the nodes to select the most energy-efficient node as the cluster head, allowing the wireless sensor network to last longer. The proposed scheme uses the CH selection probability, residual energy, and initial energy of nodes to select the appropriate node as the CH. The simulation result shows that the proposed protocol outperforms various existing clustering protocols in terms of network lifetime, throughput, and stability period.

无线传感器网络中的传感器节点能量有限。因此,有必要通过有效利用能源来确保延长网络的使用寿命。在无线传感器网络中使用基于集群的路由选择是解决能源问题和提高网络寿命的最有效方法之一。本文提出了一种基于集群的高能效路由协议,名为异构网络集群路由协议(Cluster Routing Protocol for Heterogeneous Network,CPHN)。所提出的 CPHN 利用节点的初始能量和剩余能量水平来选择能效最高的节点作为簇首,从而延长无线传感器网络的寿命。拟议方案利用节点的 CH 选择概率、剩余能量和初始能量来选择合适的节点作为 CH。仿真结果表明,拟议的协议在网络寿命、吞吐量和稳定期方面都优于现有的各种聚类协议。
{"title":"Energy-efficient cluster-based routing protocol for heterogeneous wireless sensor network","authors":"Piyush Rawat, Gopal Singh Rawat, Harish Rawat, Siddhartha Chauhan","doi":"10.1007/s12243-024-01015-7","DOIUrl":"https://doi.org/10.1007/s12243-024-01015-7","url":null,"abstract":"<p>The sensor nodes in a wireless sensor network are equipped with a limited amount of energy. It is therefore necessary to ensure that the network’s lifespan is extended through efficient use of energy. Using cluster-based routing in wireless sensor networks is one of the most effective ways to deal with energy issues and improve the lifetime of the network. In this paper, an energy-efficient cluster-based routing protocol named Cluster Routing Protocol for Heterogeneous Network (CPHN) is proposed. The proposed CPHN makes use of the initial and residual energy levels of the nodes to select the most energy-efficient node as the cluster head, allowing the wireless sensor network to last longer. The proposed scheme uses the CH selection probability, residual energy, and initial energy of nodes to select the appropriate node as the CH. The simulation result shows that the proposed protocol outperforms various existing clustering protocols in terms of network lifetime, throughput, and stability period.</p>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139755170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards feature engineering for intrusion detection in IEC–61850 communication networks 在 IEC-61850 通信网络中实现入侵检测特征工程
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-02-03 DOI: 10.1007/s12243-024-01011-x
Vagner E. Quincozes, Silvio E. Quincozes, Diego Passos, Célio Albuquerque, Daniel Mossé

Digital electrical substations are fundamental in providing a reliable basis for smart grids. However, the deployment of the IEC–61850 standards for communication between intelligent electronic devices (IEDs) brings new security challenges. Intrusion detection systems (IDSs) play a vital role in ensuring the proper function of digital substations services. However, the current literature lacks efficient IDS solutions for certain classes of attacks, such as the masquerade attack. In this work, we propose the extraction and correlation of relevant multi-layer information through a feature engineering process to enable the deployment of machine learning-based IDSs in digital substations. Our results demonstrate that the proposed solution can detect attacks that are considered challenging in the literature, attaining an F1-score of up to 95.6% in the evaluated scenarios.

数字化变电站是为智能电网提供可靠基础的根本。然而,智能电子设备 (IED) 之间通信的 IEC-61850 标准的部署带来了新的安全挑战。入侵检测系统(IDS)在确保数字变电站服务正常运行方面发挥着至关重要的作用。然而,目前的文献缺乏针对某些攻击类别(如伪装攻击)的高效 IDS 解决方案。在这项工作中,我们提出通过特征工程流程提取和关联相关的多层信息,以便在数字变电站中部署基于机器学习的 IDS。我们的研究结果表明,所提出的解决方案可以检测到文献中认为具有挑战性的攻击,在评估的场景中,F1 分数高达 95.6%。
{"title":"Towards feature engineering for intrusion detection in IEC–61850 communication networks","authors":"Vagner E. Quincozes,&nbsp;Silvio E. Quincozes,&nbsp;Diego Passos,&nbsp;Célio Albuquerque,&nbsp;Daniel Mossé","doi":"10.1007/s12243-024-01011-x","DOIUrl":"10.1007/s12243-024-01011-x","url":null,"abstract":"<div><p>Digital electrical substations are fundamental in providing a reliable basis for smart grids. However, the deployment of the IEC–61850 standards for communication between intelligent electronic devices (IEDs) brings new security challenges. Intrusion detection systems (IDSs) play a vital role in ensuring the proper function of digital substations services. However, the current literature lacks efficient IDS solutions for certain classes of attacks, such as the masquerade attack. In this work, we propose the extraction and correlation of relevant multi-layer information through a feature engineering process to enable the deployment of machine learning-based IDSs in digital substations. Our results demonstrate that the proposed solution can detect attacks that are considered challenging in the literature, attaining an F1-score of up to 95.6% in the evaluated scenarios.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.8,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139668118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Annals of Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1